Skip to main content

2015 | OriginalPaper | Buchkapitel

Addressing Privacy in Cloud Computing Environment

verfasst von : Mangqoba V. Shabalala, Paul Tarwireyi, Matthew O. Adigun

Erschienen in: e-Infrastructure and e-Services for Developing Countries

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing is growing in popularity due to its ability to offer dynamically scalable resources provisioned as services regardless of user or location device. However, moving data to the cloud means that the control of the data is more on the hands of the cloud provider rather than the data owner. This to a certain extent means that cloud users are skeptical about losing their privacy when moving data to environments they do not control. From this stems the need for the means to allow the data owner to monitor what is happening to her/his data. This paper presents a framework that could assist in efforts to address privacy issues in the cloud. A proof of concept prototype implementation is presented to validate the framework. Evaluations are then carried out to test the utility and applicability of the proposed solution.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pearson, J., Logan, C., Reis, D., Taveras, L., Koerner, D.: Answers to Healthcare Leaders’ Cloud Questions (2014) Pearson, J., Logan, C., Reis, D., Taveras, L., Koerner, D.: Answers to Healthcare Leaders’ Cloud Questions (2014)
2.
Zurück zum Zitat Allison, D.S., Capretz, M.A.: Furthering the growth of cloud computing by providing privacy as a service. In: Kranzlmüller, D., Toja, A.M. (eds.) ICT-GLOW 2011. LNCS, vol. 6868, pp. 64–78. Springer, Heidelberg (2011)CrossRef Allison, D.S., Capretz, M.A.: Furthering the growth of cloud computing by providing privacy as a service. In: Kranzlmüller, D., Toja, A.M. (eds.) ICT-GLOW 2011. LNCS, vol. 6868, pp. 64–78. Springer, Heidelberg (2011)CrossRef
3.
Zurück zum Zitat Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef
5.
Zurück zum Zitat Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T.: What’s inside the cloud? An architectural map of the cloud landscape. In: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD 2009. pp. 23–31 (2009) Lenk, A., Klems, M., Nimis, J., Tai, S., Sandholm, T.: What’s inside the cloud? An architectural map of the cloud landscape. In: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, CLOUD 2009. pp. 23–31 (2009)
7.
Zurück zum Zitat Reed, A., Rezek, C., Simmonds, P.: Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. Cloud Security Alliance (2011) Reed, A., Rezek, C., Simmonds, P.: Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. Cloud Security Alliance (2011)
8.
Zurück zum Zitat Glott, R., Husmann, E., Sadeghi, A.-R., Schunter, M.: Trustworthy clouds underpinning the future internet. In: Domingue, J., et al. (eds.) Future Internet Assembly. LNCS, vol. 6656, pp. 209–221. Springer, Heidelberg (2011)CrossRef Glott, R., Husmann, E., Sadeghi, A.-R., Schunter, M.: Trustworthy clouds underpinning the future internet. In: Domingue, J., et al. (eds.) Future Internet Assembly. LNCS, vol. 6656, pp. 209–221. Springer, Heidelberg (2011)CrossRef
9.
Zurück zum Zitat Lovrek, I., Lovric, T., Lucic, D.: Regulatory aspects of cloud computing. In: 2012 20th International Conference on Software Telecommunications and Computer Networks (SoftCOM), pp. 1–7. IEEE (2012) Lovrek, I., Lovric, T., Lucic, D.: Regulatory aspects of cloud computing. In: 2012 20th International Conference on Software Telecommunications and Computer Networks (SoftCOM), pp. 1–7. IEEE (2012)
10.
Zurück zum Zitat Ngugi, B., Dardick, G.: Security and Privacy Assurance in Advancing Technologies, 30 November 2010 Ngugi, B., Dardick, G.: Security and Privacy Assurance in Advancing Technologies, 30 November 2010
11.
Zurück zum Zitat Kandukuri, B.R., Patturi, V.R., Rakshit, A.: Cloud security issues. In: 2009 IEEE International Conference on Services Computing, pp. 517–520 (2009) Kandukuri, B.R., Patturi, V.R., Rakshit, A.: Cloud security issues. In: 2009 IEEE International Conference on Services Computing, pp. 517–520 (2009)
13.
Zurück zum Zitat Grobauer, B., Walloschek, T., Stöcker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9, 50–57 (2011)CrossRef Grobauer, B., Walloschek, T., Stöcker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9, 50–57 (2011)CrossRef
14.
Zurück zum Zitat De Oliveira, A.S., Sendor, J., Garaga, A., Jenatton, K.: Monitoring personal data transfers in the cloud. In: Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, pp. 347–354 (2013) De Oliveira, A.S., Sendor, J., Garaga, A., Jenatton, K.: Monitoring personal data transfers in the cloud. In: Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom, pp. 347–354 (2013)
15.
Zurück zum Zitat Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. J. Cryptol. 28, 312–350 (2014)CrossRefMathSciNet Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. J. Cryptol. 28, 312–350 (2014)CrossRefMathSciNet
16.
Zurück zum Zitat Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, Sfcs 1982 (1982) Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, Sfcs 1982 (1982)
17.
Zurück zum Zitat Muntés-Mulero, V., Nin, J.: Privacy and anonymization for very large datasets. In: Proceeding of the 18th ACM Conference on Information and Knowledge Management - CIKM 2009, p. 2117 (2009) Muntés-Mulero, V., Nin, J.: Privacy and anonymization for very large datasets. In: Proceeding of the 18th ACM Conference on Information and Knowledge Management - CIKM 2009, p. 2117 (2009)
18.
Zurück zum Zitat Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 362–375 (2013)CrossRefMathSciNet Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 362–375 (2013)CrossRefMathSciNet
19.
Zurück zum Zitat Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009, pp. 711–716 (2009) Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: 8th IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2009, pp. 711–716 (2009)
20.
Zurück zum Zitat Abadi, M.: Trusted computing, trusted third parties, and verified communications. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) Future Internet Assembly. IFIP, vol. 147, pp. 291–308. Springer, Heidelberg (2004)CrossRef Abadi, M.: Trusted computing, trusted third parties, and verified communications. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) Future Internet Assembly. IFIP, vol. 147, pp. 291–308. Springer, Heidelberg (2004)CrossRef
21.
Zurück zum Zitat Pearson, S., Shen, Y., Mowbray, M.: A privacy manager for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 90–106. Springer, Heidelberg (2009)CrossRef Pearson, S., Shen, Y., Mowbray, M.: A privacy manager for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 90–106. Springer, Heidelberg (2009)CrossRef
22.
Zurück zum Zitat Mowbray, M., Pearson, S., Shen, Y.: Enhancing privacy in cloud computing via policy-based obfuscation. J. Supercomput. 61, 267–291 (2012)CrossRef Mowbray, M., Pearson, S., Shen, Y.: Enhancing privacy in cloud computing via policy-based obfuscation. J. Supercomput. 61, 267–291 (2012)CrossRef
23.
Zurück zum Zitat Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Q. 34, 613–615 (2010) Anderson, C.L., Agarwal, R.: Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Q. 34, 613–615 (2010)
24.
Zurück zum Zitat Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O’Reilly, Sebastopol (2009) Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O’Reilly, Sebastopol (2009)
25.
Zurück zum Zitat Brooke, J.: SUS-A quick and dirty usability scale. Usability Eval. Ind. 189, 194 (1996) Brooke, J.: SUS-A quick and dirty usability scale. Usability Eval. Ind. 189, 194 (1996)
Metadaten
Titel
Addressing Privacy in Cloud Computing Environment
verfasst von
Mangqoba V. Shabalala
Paul Tarwireyi
Matthew O. Adigun
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-16886-9_15